- Course
Design Governance and Identity Management in Microsoft Azure
Identity is the new perimeter for organizations as more aspects of the business are accomplished through SaaS. This course will guide you through the key items you need to know to design your identity management solution with Azure AD.
- Course
Design Governance and Identity Management in Microsoft Azure
Identity is the new perimeter for organizations as more aspects of the business are accomplished through SaaS. This course will guide you through the key items you need to know to design your identity management solution with Azure AD.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Cloud
What you'll learn
Identity has replaced the network as the perimeter for organizations, and having a strong identity plan is critical as cloud services become core to every organization. In this course, Design Governance and Identity Management in Microsoft Azure, you will gain the foundational knowledge necessary to utilize Azure AD to enable a highly secure identity that can be leveraged across your organization’s services and those applications provided externally. First, you will learn the key concepts of cloud authentication and the basics of Azure AD. Next, you will discover key technologies to help design a first-class identity management approach, including groups, roles, and conditional access. Finally, you will explore how to lighten up services for end users via a number of end-user experiences. When you’re finished with this course, you will have the skills and knowledge of cloud identity and Azure AD needed to design a secure and functional cloud identity solution that integrates into existing directories.
Design Governance and Identity Management in Microsoft Azure
-
Module Introduction | 1m 7s
-
Why Is This Important? | 58s
-
What Identities? | 2m 4s
-
Why We Don't Want Multiple Identities | 5m 42s
-
What Is an Identity? | 3m 17s
-
Authentication vs. Authorization | 1m 57s
-
How Identities Have Changed | 5m 57s
-
Four Pillars of Identity | 6m 11s
-
The Importance of Roles | 3m 33s
-
JIT, JEA, and RBAC | 2m 51s
-
Module Summary | 32s